modsecurity-crs 3.3.4-1 source package in Ubuntu
Changelog
modsecurity-crs (3.3.4-1) unstable; urgency=medium * New upstream version * Fixes CVE-2022-39955, CVE-2022-39956, CVE-2022-39957 and CVE-2022-39958. (Closes: #1021137) * Lower libapache2-mod-security2 Recommends to Suggests. Bump version number due to new requirements. -- Ervin Hegedüs <email address hidden> Sun, 02 Oct 2022 17:24:54 +0200
Upload details
- Uploaded by:
- Alberto Gonzalez Iniesta
- Uploaded to:
- Sid
- Original maintainer:
- Alberto Gonzalez Iniesta
- Architectures:
- all
- Section:
- httpd
- Urgency:
- Medium Urgency
See full publishing history Publishing
Series | Published | Component | Section | |
---|---|---|---|---|
Lunar | release | universe | httpd |
Downloads
File | Size | SHA-256 Checksum |
---|---|---|
modsecurity-crs_3.3.4-1.dsc | 1.9 KiB | fe41ef62717a0d0bd79e084468b1ff8916b861bbf6f4e178502e4757debd28fd |
modsecurity-crs_3.3.4.orig.tar.gz | 294.1 KiB | 15a84aaa041aa532905a34546b613bd3aed122e3f9814fbb5c28e1655d02b74d |
modsecurity-crs_3.3.4-1.debian.tar.xz | 4.1 KiB | bfc139bcb834219292c0db7ea356afa2dad75d06b4e869c193df9ce00b2de8e1 |
Available diffs
- diff from 3.3.2-1 to 3.3.4-1 (31.7 KiB)
No changes file available.
Binary packages built by this source
- modsecurity-crs: OWASP ModSecurity Core Rule Set
modsecurity provides critical protections against attacks across most every
web architecture. CRS is based on generic rules which focus on attack payload
identification in order to provide protection from zero day and unknown
vulnerabilities often found in web applications, which are in most cases
custom coded.
.
Core Rules use the following techniques: HTTP request validation, HTTP
protocol anomalies, Global constraints, HTTP Usage policy, Malicious client
software detection, Generic Attack Detection (SQL injection, Cross Site
Scripting, OS Command Injection, ColdFusion, PHP and ASP injection, etc.),
Trojans & Backdoors Detection, Error Detection, XML Protection, Search Engine
Monitoring.